Home / Spyware Encyclopedia / Trojan.Auslogics << Back

Recommendation to Automatically remove Trojan.Auslogics


Our products can remove Trojan.Auslogics and thousands of other Virus and Spyware automatically and instantly.

Trojan.Auslogics Details


  • Category Trojan
  • Discovered 4/13/2018 9:56:23 PM
  • Modified 9/27/2023 5:16:12 PM
  • Threat Level Low
  • Category Description
    A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

The following Files were created:
VALUEFILESIZECOMPANYNAMEVERSIONSIGNATUREDate
af53814d83e14aa63e221583b22b0820.vir.dll 314952TweakBit7.9.0.0af53814d83e14aa63e221583b22b0820 
f75dfc8799393387197966f4b485db2c.exe 768664TweakBit2.0.0.0f75dfc8799393387197966f4b485db2c 
a7b53c076703e98496f3f5ddfbfc6280.vir.exe 510616TweakBit1.8.3.9a7b53c076703e98496f3f5ddfbfc6280 
4dbd7484b5a2afcfe1688cf7523f3ba0.vir.exe 510616TweakBit1.8.3.94dbd7484b5a2afcfe1688cf7523f3ba0 
943d0ecbeae2a3d4f4dc7902ecdce670.vir 350124  943d0ecbeae2a3d4f4dc7902ecdce670 
8bff3cd292cebf3e8bce4226a5513d70.vir.exe 544920TweakBit1.8.3.128bff3cd292cebf3e8bce4226a5513d70 
a823ff2441d51d4e6154a2c1c5ae53d0.vir.exe 544920TweakBit1.8.3.12a823ff2441d51d4e6154a2c1c5ae53d0 
0d9042cc488159c92faf471ddc3f36e0.vir.exe 544920TweakBit1.8.3.120d9042cc488159c92faf471ddc3f36e0 
e78878c4f12c0c7c2a525fdb8d5433af.dll 204360Auslo˜gics8.0.0.0e78878c4f12c0c7c2a525fdb8d5433af 
a918bcd4f1c9c802f5462f46e0e30a6b.dll 855992SQLite Development Team3.16.0a918bcd4f1c9c802f5462f46e0e30a6b 

The following Registry Entries were created:
NA

Notice
Please note that the following information is not controlled or endorsed by Max Secure Software. They are captured automatically by tools in our malware Research Lab as a result of executing Spyware Files or browsing Internet in virtual environment. Please contact us if you find any information inappropriate for removal. All the work contained in this report is copyrighted and should not be copied without permission from Max Secure Antivirus. We do not recommend browsing or removing these entries on your own manually. We do not take any warranty against the use or result of the use of this information.

Home / Malware Encyclopedia << Back

Max Total Security can detect & quarantine this Malware